Key Terms

Two-step verification
A security process where logging in to a service requires two steps. You may have to enter in your password and enter in a code that was texted to your phone number

Security token
A key fob or other small hardware device that you carry in order to authorize access

Password
A secret combination used to access something

Better safe than sorry

Digital technology makes it easy to communicate with friends, classmates, teachers, and more. We can connect with the world in so many ways: via email, text, and instant messages; in words, pics, and videos; using phones, tablets, and laptops.

How do you connect with your friends?

But the same tools that make it easy for us to share information also make it easier for hackers and scammers to steal that information and use it to damage our devices, our relationships, and our reputations.
Protecting all the stuff that goes into creating our online reputations means doing simple, smart things like using screen locks on our devices, being careful about putting personal
info on devices that can be lost or stolen, and above all, choosing good passwords.
• Who can guess what the two most commonly used passwords are?
• Letʼs brainstorm some other bad passwords.
(Examples: your full name, your phone number, the word “chocolate”)
Who thinks these passwords are good?

Activity 1 – Survival of the Strongest

Everyone should get into pairs and retrieve a pen and sheet of paper. You have 60 seconds to come up with a super strong password that would be useful for logging in to your email account. Then we are going to vote on the strongest password.

Tips for a strong password

Here are some tips for creating passwords to safeguard your secrets.Strong passwords are based on a descriptive sentence thatʼs easy for you to remember and difficult for someone else to guess.Moderate passwords are passwords that are strong and not easy to guess by bad software, but could be guessed by someone who knows you.Weak passwords commonly use personal information, are easy to crack, and can be guessed by someone who knows you.

Hereʼs an idea for creating an extra-secure password.
Think of a fun phrase that you can remember. It could be your favourite song lyric, book title, movie catchphrase, etc.
• Choose the first letter or first two letters from each word in the phrase.
• Change some letters to symbols.
• Make some letters uppercase and some lowercase.

DO…

• Use a unique password for each of your important accounts.
• Use at least eight characters.
• Use combinations of letters (uppercase and lowercase), numbers, and symbols.

Privacy and Security Settings

Most email and social media accounts and some website accounts have settings that you can enable to protect your account.

Some options include:

• Changing your password
• Getting alerts if someone tries to log in to your account from an unknown device
• Making your online profile—including photos and videos—visible only to circles of family and friends that you choose
• Enabling two-factor or two-step verification

• Two-step verification: When you log in to your account, it will require two steps. For example, it may ask you to enter your password AND text you a code that expires in 10 minutes to enter.
• Two-factor verification: The system will require two types of information to log you in. For example, it may ask for your normal password AND your fingerprint.

Which privacy and security settings are right for you? Thatʼs something to discuss with your parent or guardian. But remember, the most important security setting is in your brain—you make the key decisions about how much of your personal info to share, when and with whom.

Choosing a strong unique password for each of your important accounts is a good first step. Now you need to remember them and also keep them safe. Writing down your passwords isnʼt necessarily a bad idea. But if you do this, donʼt leave the
page with your passwords in plain sight, such as on your computer or desk. Safeguard your list, and protect yourself, by keeping it somewhere that isnʼt easily visible.

Activity 3 – Interland Tower of Treasure

Mayday! The Tower is unlocked, leaving the Internaut’s valuables like personal info and passwords at high risk. Outrun the hacker and build an untouchable password every step of the way to secure your secrets once and for all.
Visit g.co/Interland, and navigate to the land called Tower of Treasure.

Activity 5 – Interland Discussion

• What are the elements of a super strong password?
• When is it important to create strong passwords in real life? What tips have you learned
on how to do so?
• Whatʼs a hacker? Describe this characterʼs behaviors and how they affect the game.
• Did Tower of Treasure change the way you plan to protect your information in the future?
• Name one thing youʼll do differently after learning these lessons and playing the game.
• Craft three practice passwords that pass the “super strong” test.
• What are some examples of sensitive information that should be protected?

Activity 6 – Micro:Bit Password

In pairs, can you write a Micro:Bit program that does the following:

Ask for a password to be set. (Instead of letters/numbers you’ll have to use A button, B button, A+B)

The Micro:Bit will be given to your partner and they will have to guess the password you set. If they guess correctly, show a smiley face. But if the get it wrong – sound the buzzer.

When the Micro:Bit is shaken, it should reset the game and allow a new password to be set.

(Hint – you will be a loop to check whether the password is correct and if not, ask for it to be reentered.

You will need two variables to track the passwords – the correct password (set by Player 1) and the guessed password (entered by Player 2)

That’s all folks!

That’s it for today. We hope you enjoyed this morning’s session! See you at the next one on Saturday 10th March.